US9589146B2 - Method and system for hiding sensitive data in log files - Google Patents

Method and system for hiding sensitive data in log files Download PDF

Info

Publication number
US9589146B2
US9589146B2 US14/258,294 US201414258294A US9589146B2 US 9589146 B2 US9589146 B2 US 9589146B2 US 201414258294 A US201414258294 A US 201414258294A US 9589146 B2 US9589146 B2 US 9589146B2
Authority
US
United States
Prior art keywords
log
interceptor
write operation
sensitive data
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US14/258,294
Other versions
US20150302206A1 (en
Inventor
Ingo J. Averdunk
Gianluca Della Corte
Stefano Proietti
Antonio M. Sgro
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Airbnb Inc
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US14/258,294 priority Critical patent/US9589146B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AVERDUNK, INGO J., DELLA CORTE, GIANLUCA, PROIETTI, STEFANO, SGRO, ANTONIO M.
Publication of US20150302206A1 publication Critical patent/US20150302206A1/en
Application granted granted Critical
Publication of US9589146B2 publication Critical patent/US9589146B2/en
Assigned to Airbnb, Inc. reassignment Airbnb, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Definitions

  • the present invention relates generally to data privacy, and more particularly to hiding sensitive data in log files for write operations of applications.
  • Data privacy issues can arise in information from a wide range of sources.
  • the challenge in data privacy is to share data while protecting identifiable personal information.
  • an external organization for software support is involved in solving problems of software
  • one of the most common issues with data privacy is to clean up all confidential or sensitive information from software log files before sending to the external organization for solving the problems of software.
  • the way of handling this issue is, manually or through scripting, go inside the log files to find all possible sensitive data (for example, user names, passwords, IP addresses, and etc.), and mask the sensitive data with other strings.
  • a computer-implemented method for hiding sensitive data in log files is provided.
  • the method is implemented by a background program embedded within an operating system.
  • the method comprises intercepting a write operation of an application; getting content of the write operation, in response to determining that the write operation is for a log file; checking a knowledge base which comprises information for the sensitive data; identifying the sensitive data in the content of the write operation; masking the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked; and writing, in the log file, modified content in which the sensitive data is masked.
  • a computer program product for hiding sensitive data in log files comprises a computer readable storage medium having program code embodied therewith.
  • the computer code is executable to intercept a write operation of an application.
  • the computer code is executable to get content of the write operation, in response to determining that the write operation is for a log file.
  • the computer code is executable to check a knowledge base comprising information for the sensitive data.
  • the computer code is executable to identify the sensitive data in the content of the write operation.
  • the computer code is executable to mask the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked.
  • the computer code is executable to write, in the log file, modified content in which the sensitive data is masked.
  • a computer system for hiding sensitive data in log files comprises one or more processors, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors.
  • the program instructions are executable to: intercept a write operation of an application; get content of the write operation, in response to determining that the write operation is for a log file; check a knowledge base comprising information for the sensitive data; identify the sensitive data in the content of the write operation; mask the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked; and write, in the log file, modified content in which the sensitive data is masked.
  • FIG. 1 is a diagram illustrating a computer system for hiding sensitive data in log files, in accordance with one embodiment of the present invention.
  • FIG. 2 is a flowchart illustrating operating steps for hiding sensitive data in log files, in accordance with one embodiment of the present invention.
  • FIG. 3 is a diagram illustrating components of a computer device hosting the computer system shown in FIG. 1 , in accordance with one embodiment of the present invention.
  • Embodiments of the present invention disclose a solution to resolve an issue of data privacy.
  • the solution creates a software module that will intercept all log writing requests, verifies whether a current log file line contains sensitive information by checking a knowledge base which is customizable and stores information on all sensitive data related to a specific customer/application.
  • the main advantages over the current existing solutions are as follows. (1) Since the software module is fully integrated with operating system, it does not require a change to each application. (2) The sensitive information is masked at runtime before writing them on the disk and thus the solution eliminates security exposures. (3) Performance is improved since the solution does not require any post-processing to go through all log files and find the sensitive data.
  • FIG. 1 is a diagram illustrating computer system 100 for hiding sensitive data in log files, in accordance with one embodiment of the present invention.
  • Computer system 100 comprises log interceptor 110 embedded within operating system (OS) 120 .
  • Log interceptor 110 runs in the background as a daemon of OS 120 .
  • Log interceptor 110 intercepts all calls made from applications 1 through N ( 130 - 1 through 130 -N) for write operations.
  • the write operations write log files on file system 150 .
  • Log interceptor 110 uses knowledge base 140 to identify sensitive data to be removed in the write operations.
  • knowledge base 140 stores, for example, the following data: names of all log files that applications 1 through N ( 130 - 1 through 130 -N) may write, customer sensitive information (e.g., IP addresses, hostnames, user names, etc.), and additional custom recognizable patterns validated by users.
  • Log interceptor 110 includes an embedded analytics engine; the analytics engine provides a confidence index that determines whether patterns or information in the message content are sensitive or not.
  • the analytic engine is an optional component that increases accuracy in determining the sensitive data.
  • FIG. 2 is flowchart 200 illustrating operating steps for hiding sensitive data in log files, in accordance with one embodiment of the present invention.
  • the operational steps are implemented by log interceptor 110 (shown in FIG. 1 ) running in background as a daemon of OS 120 (shown in FIG. 1 ).
  • log interceptor 110 starts in background as a daemon of OS 120 .
  • log interceptor 110 intercepts a write operation of an application (one of application 1 130 - 1 through application N 130 -N).
  • Log interceptor 110 is capable of detecting write operations of application 1 130 - 1 through application N 130 -N.
  • log interceptor 110 intercepts one or more write APIs (Application Programming Interfaces) of OS 120 .
  • log interceptor 110 determines whether the write operation is for a log file. In determining that the write operation is not for the log file (NO branch of decision block 205 ), at step 207 , log interceptor 110 allows the one or more write APIs of OS 120 to processes the write operation without writing the log file. After step 207 , log interceptor 110 , as a daemon of OS 120 , continues to run in the background; it reiterates step 203 for the next write operation. In determining that the write operation is for the log file (YES branch of decision block 205 ), at step 209 , log interceptor 110 gets message content of the write operation.
  • log interceptor 110 checks knowledge base 140 .
  • Knowledge base 140 is customizable and stores some information that log interceptor 110 uses for identifying the sensitive data.
  • the information on knowledge base 140 includes, for example, names of all log files that applications 1 through N ( 130 - 1 through 130 -N) may write, customer sensitive information (e.g., IP addresses, hostnames, user names, etc.), and additional custom recognizable patterns validated by users.
  • log interceptor 110 identifies the sensitive data in the message content.
  • Log interceptor 110 may include an embedded analytics engine to provide a confidence index that determines whether patterns or information in the message content are sensitive or not.
  • Log interceptor 110 is a component that increases accuracy of the determination of the embedded analytics engine.
  • log interceptor 110 determines whether the message content of the write operation has the sensitive data to be masked. In determining that the message content of the write operation does not have the sensitive data to be masked (NO branch of decision block 215 ), log interceptor 110 at step 217 allows the one or more write APIs of OS 120 to write, on file system 150 , the message content without masking any data. After step 217 , log interceptor 110 , as a daemon of OS 120 , continues to run in the background; it reiterates step 203 for the next write operation. In determining that the message content of the write operation has the sensitive data to be masked (YES branch of decision block 215 ), log interceptor 110 at step 219 masks the sensitive data. Log interceptor 110 manipulates the sensitive data by masking with some blanks or special strings.
  • log interceptor 110 at step 221 updates knowledge base 140 .
  • Log interceptor 110 stores, on knowledge base 140 , information of masking the sensitive data in the current write operation; thus, log interceptor 110 acts as a self-learning system. Updating knowledge base 140 can be done real time, or the message about updating can be marked as to be reviewed by a user. The user is able to determine whether the information of masking the sensitive data in the current write operation is used to update knowledge base 140 .
  • log interceptor 110 writes modified message content in the log file on file system 150 .
  • the sensitive data has been masked at step 219 .
  • log interceptor 110 as a daemon of OS 120 , continues to run in the background; it reiterates step 203 for the next write operation.
  • FIG. 3 is a diagram illustrating components of computer device 300 hosting computer system 100 shown in FIG. 1 , in accordance with one embodiment of the present invention. It should be appreciated that FIG. 3 provides only an illustration of one implementation and does not imply any limitations with regard to the environment in which different embodiments may be implemented. In other embodiments, computer system 100 may be hosted by a cluster of computing devices connected by a network.
  • the hardware of computer device 300 includes processor(s) 320 , memory 310 , tangible storage device(s) 330 , network interface(s) 340 , and I/O (input/output) interface(s) 350 .
  • processor(s) 320 the hardware of computer device 300 includes processor(s) 320 , memory 310 , tangible storage device(s) 330 , network interface(s) 340 , and I/O (input/output) interface(s) 350 .
  • communications among the above-mentioned components of computing device 300 are denoted by numeral 390 .
  • Memory 310 includes ROM(s) (Read Only Memory) 311 , RAM(s) (Random Access Memory) 313 , and cache(s) 315 .
  • Operating system 120 and log interceptor 110 reside on one or more computer-readable tangible storage device(s) 330 .
  • applications 1 through N reside on at least one of one or more computer-readable tangible storage device(s) 330 .
  • one or more of applications 1 through N may reside on at least one other computer device which is connected through a network to a computer device hosting operating system 120 and log interceptor 110 .
  • knowledge base 140 resides on at least one of one or more computer-readable tangible storage device(s) 330 .
  • knowledge base 140 may reside on at least one other computer device which is connected through a network to a computer device hosting operating system 120 and log interceptor 110 .
  • file system 150 resides on at least one of one or more computer-readable tangible storage device(s) 330 .
  • file system 150 may reside on at least one other computer device which is connected through a network to a computer device hosting operating system 120 and log interceptor 110 .
  • Computing device 300 further includes I/O interface(s) 350 .
  • I/O interface(s) 350 allows for input and output of data with external device(s) 360 that may be connected to computing device 300 .
  • Computing device 300 further includes network interface(s) 340 for communications between computing device 300 and a computer network.
  • the present invention may be a system, a method, and/or a computer program product.
  • the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
  • the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
  • the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing.
  • RAM random access memory
  • ROM read-only memory
  • EPROM or Flash memory erasable programmable read-only memory
  • SRAM static random access memory
  • CD-ROM compact disc read-only memory
  • DVD digital versatile disk
  • memory stick a floppy disk
  • a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon
  • a computer readable storage medium is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
  • Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network (LAN), a wide area network (WAN), and/or a wireless network.
  • the network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
  • a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
  • Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
  • These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture, including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus, or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the block may occur out of the order noted in the figures.
  • two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.

Abstract

An approach for hiding sensitive data in log files is provided. The approach uses a background program embedded within an operating system. The background program intercepts a write operation of an application and, in response to determining that the write operation is for a log file, gets content of the write operation. The background program checks a knowledge base that comprises information for the sensitive data and identifies the sensitive data in the content of the write operation. The background program masks the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked. In the log file, the background program writes modified content in which the sensitive data is masked.

Description

TECHNICAL FIELD OF THE INVENTION
The present invention relates generally to data privacy, and more particularly to hiding sensitive data in log files for write operations of applications.
BACKGROUND
Privacy concerns exist wherever identifiable personal information is collected and stored in digital forms. Data privacy issues can arise in information from a wide range of sources. The challenge in data privacy is to share data while protecting identifiable personal information. When an external organization for software support is involved in solving problems of software, one of the most common issues with data privacy is to clean up all confidential or sensitive information from software log files before sending to the external organization for solving the problems of software. Currently, the way of handling this issue is, manually or through scripting, go inside the log files to find all possible sensitive data (for example, user names, passwords, IP addresses, and etc.), and mask the sensitive data with other strings.
SUMMARY
In one aspect, a computer-implemented method for hiding sensitive data in log files is provided. The method is implemented by a background program embedded within an operating system. The method comprises intercepting a write operation of an application; getting content of the write operation, in response to determining that the write operation is for a log file; checking a knowledge base which comprises information for the sensitive data; identifying the sensitive data in the content of the write operation; masking the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked; and writing, in the log file, modified content in which the sensitive data is masked.
In another aspect, a computer program product for hiding sensitive data in log files is provided. The computer program product comprises a computer readable storage medium having program code embodied therewith. The computer code is executable to intercept a write operation of an application. The computer code is executable to get content of the write operation, in response to determining that the write operation is for a log file. The computer code is executable to check a knowledge base comprising information for the sensitive data. The computer code is executable to identify the sensitive data in the content of the write operation. The computer code is executable to mask the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked. The computer code is executable to write, in the log file, modified content in which the sensitive data is masked.
In yet another aspect, a computer system for hiding sensitive data in log files is provided. The computer system comprises one or more processors, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors. The program instructions are executable to: intercept a write operation of an application; get content of the write operation, in response to determining that the write operation is for a log file; check a knowledge base comprising information for the sensitive data; identify the sensitive data in the content of the write operation; mask the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked; and write, in the log file, modified content in which the sensitive data is masked.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
FIG. 1 is a diagram illustrating a computer system for hiding sensitive data in log files, in accordance with one embodiment of the present invention.
FIG. 2 is a flowchart illustrating operating steps for hiding sensitive data in log files, in accordance with one embodiment of the present invention.
FIG. 3 is a diagram illustrating components of a computer device hosting the computer system shown in FIG. 1, in accordance with one embodiment of the present invention.
DETAILED DESCRIPTION
Embodiments of the present invention disclose a solution to resolve an issue of data privacy. The solution creates a software module that will intercept all log writing requests, verifies whether a current log file line contains sensitive information by checking a knowledge base which is customizable and stores information on all sensitive data related to a specific customer/application. The main advantages over the current existing solutions are as follows. (1) Since the software module is fully integrated with operating system, it does not require a change to each application. (2) The sensitive information is masked at runtime before writing them on the disk and thus the solution eliminates security exposures. (3) Performance is improved since the solution does not require any post-processing to go through all log files and find the sensitive data.
FIG. 1 is a diagram illustrating computer system 100 for hiding sensitive data in log files, in accordance with one embodiment of the present invention. Computer system 100 comprises log interceptor 110 embedded within operating system (OS) 120. Log interceptor 110 runs in the background as a daemon of OS 120. Log interceptor 110 intercepts all calls made from applications 1 through N (130-1 through 130-N) for write operations. The write operations write log files on file system 150. Log interceptor 110 uses knowledge base 140 to identify sensitive data to be removed in the write operations. To help log interceptor 110 identify the sensitive data, knowledge base 140 stores, for example, the following data: names of all log files that applications 1 through N (130-1 through 130-N) may write, customer sensitive information (e.g., IP addresses, hostnames, user names, etc.), and additional custom recognizable patterns validated by users. Log interceptor 110 includes an embedded analytics engine; the analytics engine provides a confidence index that determines whether patterns or information in the message content are sensitive or not. The analytic engine is an optional component that increases accuracy in determining the sensitive data.
FIG. 2 is flowchart 200 illustrating operating steps for hiding sensitive data in log files, in accordance with one embodiment of the present invention. The operational steps are implemented by log interceptor 110 (shown in FIG. 1) running in background as a daemon of OS 120 (shown in FIG. 1).
At step 201, log interceptor 110 starts in background as a daemon of OS 120. At step 203, log interceptor 110 intercepts a write operation of an application (one of application 1 130-1 through application N 130-N). Log interceptor 110 is capable of detecting write operations of application 1 130-1 through application N 130-N. At this step, log interceptor 110 intercepts one or more write APIs (Application Programming Interfaces) of OS 120.
At decision block 205, log interceptor 110 determines whether the write operation is for a log file. In determining that the write operation is not for the log file (NO branch of decision block 205), at step 207, log interceptor 110 allows the one or more write APIs of OS 120 to processes the write operation without writing the log file. After step 207, log interceptor 110, as a daemon of OS 120, continues to run in the background; it reiterates step 203 for the next write operation. In determining that the write operation is for the log file (YES branch of decision block 205), at step 209, log interceptor 110 gets message content of the write operation.
At step 211, log interceptor 110 checks knowledge base 140. Knowledge base 140 is customizable and stores some information that log interceptor 110 uses for identifying the sensitive data. The information on knowledge base 140 includes, for example, names of all log files that applications 1 through N (130-1 through 130-N) may write, customer sensitive information (e.g., IP addresses, hostnames, user names, etc.), and additional custom recognizable patterns validated by users.
At step 213, log interceptor 110 identifies the sensitive data in the message content. Log interceptor 110 may include an embedded analytics engine to provide a confidence index that determines whether patterns or information in the message content are sensitive or not. Log interceptor 110 is a component that increases accuracy of the determination of the embedded analytics engine.
At decision block 215, log interceptor 110 determines whether the message content of the write operation has the sensitive data to be masked. In determining that the message content of the write operation does not have the sensitive data to be masked (NO branch of decision block 215), log interceptor 110 at step 217 allows the one or more write APIs of OS 120 to write, on file system 150, the message content without masking any data. After step 217, log interceptor 110, as a daemon of OS 120, continues to run in the background; it reiterates step 203 for the next write operation. In determining that the message content of the write operation has the sensitive data to be masked (YES branch of decision block 215), log interceptor 110 at step 219 masks the sensitive data. Log interceptor 110 manipulates the sensitive data by masking with some blanks or special strings.
After step 219, log interceptor 110 at step 221 updates knowledge base 140. Log interceptor 110 stores, on knowledge base 140, information of masking the sensitive data in the current write operation; thus, log interceptor 110 acts as a self-learning system. Updating knowledge base 140 can be done real time, or the message about updating can be marked as to be reviewed by a user. The user is able to determine whether the information of masking the sensitive data in the current write operation is used to update knowledge base 140.
At step 223, log interceptor 110 writes modified message content in the log file on file system 150. In the modified message, the sensitive data has been masked at step 219. After step 223, log interceptor 110, as a daemon of OS 120, continues to run in the background; it reiterates step 203 for the next write operation.
FIG. 3 is a diagram illustrating components of computer device 300 hosting computer system 100 shown in FIG. 1, in accordance with one embodiment of the present invention. It should be appreciated that FIG. 3 provides only an illustration of one implementation and does not imply any limitations with regard to the environment in which different embodiments may be implemented. In other embodiments, computer system 100 may be hosted by a cluster of computing devices connected by a network.
Referring to FIG. 3, the hardware of computer device 300 includes processor(s) 320, memory 310, tangible storage device(s) 330, network interface(s) 340, and I/O (input/output) interface(s) 350. In FIG. 3, communications among the above-mentioned components of computing device 300 are denoted by numeral 390. Memory 310 includes ROM(s) (Read Only Memory) 311, RAM(s) (Random Access Memory) 313, and cache(s) 315.
Operating system 120 and log interceptor 110 reside on one or more computer-readable tangible storage device(s) 330. In accordance with one embodiment of the present invention, applications 1 through N (130-1 through 130-N) reside on at least one of one or more computer-readable tangible storage device(s) 330. In other embodiments, one or more of applications 1 through N (130-1 through 130-N) may reside on at least one other computer device which is connected through a network to a computer device hosting operating system 120 and log interceptor 110. In accordance with one embodiment of the present invention, knowledge base 140 resides on at least one of one or more computer-readable tangible storage device(s) 330. In other embodiments, knowledge base 140 may reside on at least one other computer device which is connected through a network to a computer device hosting operating system 120 and log interceptor 110. In accordance with one embodiment of the present invention, file system 150 resides on at least one of one or more computer-readable tangible storage device(s) 330. In other embodiments, file system 150 may reside on at least one other computer device which is connected through a network to a computer device hosting operating system 120 and log interceptor 110.
Computing device 300 further includes I/O interface(s) 350. I/O interface(s) 350 allows for input and output of data with external device(s) 360 that may be connected to computing device 300. Computing device 300 further includes network interface(s) 340 for communications between computing device 300 and a computer network.
The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network (LAN), a wide area network (WAN), and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture, including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus, or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.

Claims (12)

What is claimed is:
1. A computer-implemented method for hiding sensitive data in log files, the method comprising:
intercepting, by a log interceptor for hiding the sensitive data in the log files, a write operation of an application, wherein the log interceptor is embedded within an operating system and runs as a daemon in background, wherein the log interceptor comprises an analytics engine and the analytics engine provides a confidence index that determines whether patterns and information in message content of the write operation are sensitive;
getting, by the log interceptor, content of the write operation, in response to determining that the write operation is for a log file;
checking, by the log interceptor, a knowledge base, the knowledge base comprising information for the sensitive data, the information for the sensitive data including names of log files that applications write and customer sensitive information;
identifying, by the log interceptor, the sensitive data in the content of the write operation, by using the confidence index;
masking, by the log interceptor, the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked;
writing, by the log interceptor, in the log file, modified content in which the sensitive data is masked; and
updating, by the log interceptor, the knowledge base, by storing information of masking the sensitive data in the write operation.
2. The computer-implemented method of claim 1, further comprising:
processing, by the log interceptor, the write operation without writing the log file, in response to determining that the write operation is not for the log file.
3. The computer-implemented method of claim 1, further comprising:
writing the content, by the log interceptor, without masking in the log file, in response to determining that the content of the write operation does not have the sensitive data to be masked.
4. The computer-implemented method of claim 1, wherein the log interceptor intercepts a write API (Application Programming Interface) of the operating system.
5. A computer program product for hiding sensitive data in log files, the computer program product comprising a computer readable storage medium having program code, the program code executable to:
intercept, by a log interceptor for hiding the sensitive data in the log files, a write operation of an application, wherein the log interceptor is embedded within an operating system and runs as a daemon in background, wherein the log interceptor comprises an analytics engine and the analytics engine provides a confidence index that determines whether patterns and information in message content of the write operation are sensitive;
get, by the log interceptor, content of the write operation, in response to determining that the write operation is for a log file;
check, by the log interceptor, a knowledge base, the knowledge base comprising information for the sensitive data, the information for the sensitive data including names of log files that applications write and customer sensitive information;
identify, by the log interceptor, the sensitive data in the content of the write operation, by using the confidence index;
mask, by the log interceptor, the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked;
write, by the log interceptor, in the log file, modified content in which the sensitive data is masked; and
update, by the log interceptor, the knowledge base, by storing information of masking the sensitive data in the write operation.
6. The computer program product of claim 5, further comprising the program code executable to:
process, by the log interceptor, the write operation without writing the log file, in response to determining that the write operation is not for the log file.
7. The computer program product of claim 5, further comprising the program code executable to:
write the content, by the log interceptor, without masking in the log file, in response to determining that the content of the write operation does not have the sensitive data to be masked.
8. The computer program product of claim 5, wherein the log interceptor intercepts a write API (Application Programming Interface) of the operating system.
9. A computer system for hiding sensitive data in log files, the computer system comprising:
one or more processors, one or more computer-readable tangible storage devices, and program instructions, the program instructions stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors, the program instructions executable to:
intercept, by a log interceptor for hiding the sensitive data in the log files, a write operation of an application, wherein the log interceptor is embedded within an operating system and runs as a daemon in background, wherein the log interceptor comprises an analytics engine and the analytics engine provides a confidence index that determines whether patterns and information in message content of the write operation are sensitive;
get, by the log interceptor, content of the write operation, in response to determining that the write operation is for a log file;
check, by the log interceptor, a knowledge base, the knowledge base comprising information for the sensitive data, the information for the sensitive data including names of log files that applications write and customer sensitive information;
identify, by the log interceptor, the sensitive data in the content of the write operation, by using the confidence index;
mask, by the log interceptor, the sensitive data in the content of the write operation, in response to determining that the content of the write operation has the sensitive data to be masked;
write, by the log interceptor, in the log file, modified content in which the sensitive data is masked; and
update, by the log interceptor, the knowledge base, by storing information of masking the sensitive data in the write operation.
10. The computer system of claim 9, further comprising the program instructions executable to:
process, by the log interceptor, the write operation without writing the log file, in response to determining that the write operation is not for the log file.
11. The computer system of claim 9, further comprising the program instructions executable to:
write the content, by the log interceptor, without masking in the log file, in response to determining that the content of the write operation does not have the sensitive data to be masked.
12. The computer system of claim 9, wherein the log interceptor intercepts a write API (Application Programming Interface) of the operating system.
US14/258,294 2014-04-22 2014-04-22 Method and system for hiding sensitive data in log files Expired - Fee Related US9589146B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/258,294 US9589146B2 (en) 2014-04-22 2014-04-22 Method and system for hiding sensitive data in log files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/258,294 US9589146B2 (en) 2014-04-22 2014-04-22 Method and system for hiding sensitive data in log files

Publications (2)

Publication Number Publication Date
US20150302206A1 US20150302206A1 (en) 2015-10-22
US9589146B2 true US9589146B2 (en) 2017-03-07

Family

ID=54322257

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/258,294 Expired - Fee Related US9589146B2 (en) 2014-04-22 2014-04-22 Method and system for hiding sensitive data in log files

Country Status (1)

Country Link
US (1) US9589146B2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170372079A1 (en) * 2016-06-23 2017-12-28 International Business Machines Corporation Selective data encryption
US10346392B2 (en) * 2015-08-06 2019-07-09 Tata Consultancy Services Limited Methods and systems for transaction processing
US11138328B2 (en) 2019-05-30 2021-10-05 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11153315B2 (en) 2019-05-30 2021-10-19 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11165777B2 (en) 2019-05-30 2021-11-02 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017070599A1 (en) * 2015-10-23 2017-04-27 Oracle International Corporation Automatic operation detection on protected field with support for federated search
US9501654B1 (en) 2015-11-19 2016-11-22 International Business Machines Corporation Sensitive data obfuscation in output files
US10326772B2 (en) * 2015-11-20 2019-06-18 Symantec Corporation Systems and methods for anonymizing log entries
US11593511B2 (en) 2019-10-10 2023-02-28 International Business Machines Corporation Dynamically identifying and redacting data from diagnostic operations via runtime monitoring of data sources
US11580255B2 (en) * 2019-11-11 2023-02-14 Bank Of America Corporation Security tool for n-tier platforms
CN111931203A (en) * 2020-07-15 2020-11-13 深信服科技股份有限公司 Sensitive data analysis method, device, equipment and storage medium
CN112182581B (en) * 2020-09-24 2023-10-13 百度在线网络技术(北京)有限公司 Application testing method, device, application testing equipment and storage medium
CN113343699B (en) * 2021-06-22 2023-10-20 湖北华中电力科技开发有限责任公司 Log security risk monitoring method and device, electronic equipment and medium
CN115514564B (en) * 2022-09-22 2023-06-16 成都坐联智城科技有限公司 Data security processing method and system based on data sharing
CN115859368B (en) * 2023-02-07 2023-05-12 支付宝(杭州)信息技术有限公司 Data desensitization method, device, equipment and readable storage medium

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020178382A1 (en) * 2001-03-02 2002-11-28 Toru Mukai Security administration server and its host server
US20030212899A1 (en) * 2002-05-09 2003-11-13 International Business Machines Corporation Method and apparatus for protecting sensitive information in a log file
US20050114207A1 (en) * 2003-11-25 2005-05-26 International Business Machines Corporation Method, system, and storage medium for filtering content presented on a computer system
WO2006025970A2 (en) 2004-08-30 2006-03-09 Encryptx Corporation Automatically detecting sensitive digital information
US20070288768A1 (en) * 2004-04-06 2007-12-13 Nesta Pasquale A Secure Logging For Irrefutable Administration
US20080256354A1 (en) * 2005-11-17 2008-10-16 Steven Blumenau Systems and methods for exception handling
WO2009015616A2 (en) 2007-07-30 2009-02-05 Kencl Lukas Masking sensitive information while preserving parts of the information
US20090132419A1 (en) * 2007-11-15 2009-05-21 Garland Grammer Obfuscating sensitive data while preserving data usability
US20090300002A1 (en) * 2008-05-28 2009-12-03 Oracle International Corporation Proactive Information Security Management
US7703144B2 (en) * 2005-04-12 2010-04-20 International Business Machines Corporation Method, apparatus, and program to post process applications encrypting sensitive objects that are logged
US7870614B1 (en) * 2006-01-27 2011-01-11 Aspect Loss Prevention, LLC Sensitive data aliasing
US20110131188A1 (en) * 2009-12-01 2011-06-02 International Business Machines Corporation Method and system for real time system log integrity protection
US20110191394A1 (en) * 2010-01-29 2011-08-04 Winteregg Joel Method of processing log files in an information system, and log file processing system
US8051410B2 (en) * 2003-12-15 2011-11-01 Evolveware, Inc. Apparatus for migration and conversion of software code from any source platform to any target platform
US8166313B2 (en) 2008-05-08 2012-04-24 Fedtke Stephen U Method and apparatus for dump and log anonymization (DALA)
US8260803B2 (en) * 2010-09-23 2012-09-04 Hewlett-Packard Development Company, L.P. System and method for data stream processing
US20120239540A1 (en) 2011-03-17 2012-09-20 Attachmate Corporation Systems, devices and methods for automatic detection and masking of private data
US8316240B2 (en) * 2009-02-20 2012-11-20 International Business Machines Corporation Securing computer log files
US8433863B1 (en) * 2008-03-27 2013-04-30 Symantec Operating Corporation Hybrid method for incremental backup of structured and unstructured files
US20130152158A1 (en) 2011-11-28 2013-06-13 International Business Machines Corporation Confidential information identifying method, information processing apparatus, and program
US8836479B2 (en) * 2010-11-22 2014-09-16 Athoc, Inc. Alerting system using distributed notification delivery

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020178382A1 (en) * 2001-03-02 2002-11-28 Toru Mukai Security administration server and its host server
US20030212899A1 (en) * 2002-05-09 2003-11-13 International Business Machines Corporation Method and apparatus for protecting sensitive information in a log file
US7475260B2 (en) * 2002-05-09 2009-01-06 International Business Machines Corporation Method and apparatus for protecting sensitive information in a log file
US20050114207A1 (en) * 2003-11-25 2005-05-26 International Business Machines Corporation Method, system, and storage medium for filtering content presented on a computer system
US8051410B2 (en) * 2003-12-15 2011-11-01 Evolveware, Inc. Apparatus for migration and conversion of software code from any source platform to any target platform
US20070288768A1 (en) * 2004-04-06 2007-12-13 Nesta Pasquale A Secure Logging For Irrefutable Administration
WO2006025970A2 (en) 2004-08-30 2006-03-09 Encryptx Corporation Automatically detecting sensitive digital information
US7703144B2 (en) * 2005-04-12 2010-04-20 International Business Machines Corporation Method, apparatus, and program to post process applications encrypting sensitive objects that are logged
US20080256354A1 (en) * 2005-11-17 2008-10-16 Steven Blumenau Systems and methods for exception handling
US7870614B1 (en) * 2006-01-27 2011-01-11 Aspect Loss Prevention, LLC Sensitive data aliasing
WO2009015616A2 (en) 2007-07-30 2009-02-05 Kencl Lukas Masking sensitive information while preserving parts of the information
US20090132419A1 (en) * 2007-11-15 2009-05-21 Garland Grammer Obfuscating sensitive data while preserving data usability
US8433863B1 (en) * 2008-03-27 2013-04-30 Symantec Operating Corporation Hybrid method for incremental backup of structured and unstructured files
US8166313B2 (en) 2008-05-08 2012-04-24 Fedtke Stephen U Method and apparatus for dump and log anonymization (DALA)
US20090300002A1 (en) * 2008-05-28 2009-12-03 Oracle International Corporation Proactive Information Security Management
US8316240B2 (en) * 2009-02-20 2012-11-20 International Business Machines Corporation Securing computer log files
US20110131188A1 (en) * 2009-12-01 2011-06-02 International Business Machines Corporation Method and system for real time system log integrity protection
US20110191394A1 (en) * 2010-01-29 2011-08-04 Winteregg Joel Method of processing log files in an information system, and log file processing system
US8260803B2 (en) * 2010-09-23 2012-09-04 Hewlett-Packard Development Company, L.P. System and method for data stream processing
US8836479B2 (en) * 2010-11-22 2014-09-16 Athoc, Inc. Alerting system using distributed notification delivery
US20120239540A1 (en) 2011-03-17 2012-09-20 Attachmate Corporation Systems, devices and methods for automatic detection and masking of private data
US20130152158A1 (en) 2011-11-28 2013-06-13 International Business Machines Corporation Confidential information identifying method, information processing apparatus, and program

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"How to Hide Confidential Data in Text Files", maketecheasier, Jan. 31, 2010, © 2007-2014 Make Tech Easier, All rights reserved, .
"How to Hide Confidential Data in Text Files", maketecheasier, Jan. 31, 2010, © 2007-2014 Make Tech Easier, All rights reserved, <http://www.maketecheasier.com/hide-confidential-data-in-text-files/>.
"Information Redaction and Masking in Log and Trace Files", An IP.com Prior Art Database Technical Disclosure, Authors et. al.: Disclosed Anonymously, IP.com No. IPCOM000233197D, IP.com Electronic Publication: Dec. 2, 2013, pp. 1-4.
"Support for confidential logging and tracing", IBM, WebSphere Adapters, Version 6.2.0, Operating Systems: AIX, HP-UX, Linux, Solaris, Windows, z/OS, IBM i, WebSphere Adapter for FTP, (C) Copyright IBM Corporation 2005, 2009, All Rights Reserved, <http://publib.boulder.ibm.com/infocenter/dmndhelp/v6r2mx/index.jsp?topic=/com.ibm.wsadapters.620.jca.ftp.doc/doc/cbp-ftp-confidential-trace.html>.
"System and method to allow the ability to prevent programming trace data in containing sensitive information", An IP.com Prior Art Database Technical Disclosure, Authors et. al.: Disclosed Anonymously, IP.com No. IPCOM000204074D, IP.com Electronic Publication: Feb. 10, 2011, pp. 1-2.

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10346392B2 (en) * 2015-08-06 2019-07-09 Tata Consultancy Services Limited Methods and systems for transaction processing
US20170372079A1 (en) * 2016-06-23 2017-12-28 International Business Machines Corporation Selective data encryption
US11138328B2 (en) 2019-05-30 2021-10-05 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11153315B2 (en) 2019-05-30 2021-10-19 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11165777B2 (en) 2019-05-30 2021-11-02 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11711369B2 (en) 2019-05-30 2023-07-25 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11743262B2 (en) 2019-05-30 2023-08-29 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
US11783074B2 (en) 2019-05-30 2023-10-10 Bank Of America Corporation Controlling access to secure information resources using rotational datasets and dynamically configurable data containers

Also Published As

Publication number Publication date
US20150302206A1 (en) 2015-10-22

Similar Documents

Publication Publication Date Title
US9589146B2 (en) Method and system for hiding sensitive data in log files
US11275839B2 (en) Code package processing
US10032043B2 (en) Masking sensitive data in mobile applications
US20180121657A1 (en) Security risk evaluation
US10771494B2 (en) Runtime protection of web services
US9910979B2 (en) Intercepting inter-process communications
US10997279B2 (en) Watermarking anonymized datasets by adding decoys
US9721095B2 (en) Preventing re-patching by malware on a computer
US10305936B2 (en) Security inspection of massive virtual hosts for immutable infrastructure and infrastructure as code
US10664267B2 (en) Automatically detecting feature mismatches between mobile application versions on different platforms
US20190108339A1 (en) Deactivating evasive malware
WO2023078076A1 (en) Log information processing method and apparatus, device, storage medium, and program product
US20170177868A1 (en) Detecting malicious code based on conditional branch asymmetry
US10782940B2 (en) Code library version management
US10069848B2 (en) Method and system for data security
US20190236269A1 (en) Detecting third party software elements
US9589133B2 (en) Preventing return-oriented programming exploits
US20230185866A1 (en) Deleting web browser data
US10331436B2 (en) Smart reviews for applications in application stores
US11032306B2 (en) System, method and apparatus for fully precise hybrid security verification of mobile applications
US9911003B2 (en) Dynamic data masking of post-output database data
US9858423B2 (en) Application modification based on a security vulnerability
US9785790B2 (en) Protecting computer security applications
US20170199730A1 (en) Application Modification
US20170024125A1 (en) Selective touch screen disablement for user interface control

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:AVERDUNK, INGO J.;DELLA CORTE, GIANLUCA;PROIETTI, STEFANO;AND OTHERS;SIGNING DATES FROM 20140402 TO 20140405;REEL/FRAME:032726/0746

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: AIRBNB, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:056427/0193

Effective date: 20210106

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210307